US20200004775A1 - Apparatus and methods for retrieving lost property - Google Patents
Apparatus and methods for retrieving lost property Download PDFInfo
- Publication number
- US20200004775A1 US20200004775A1 US16/451,182 US201916451182A US2020004775A1 US 20200004775 A1 US20200004775 A1 US 20200004775A1 US 201916451182 A US201916451182 A US 201916451182A US 2020004775 A1 US2020004775 A1 US 2020004775A1
- Authority
- US
- United States
- Prior art keywords
- owner
- method includes
- network
- token
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 95
- 238000004891 communication Methods 0.000 claims abstract description 25
- 239000011888 foil Substances 0.000 claims description 21
- 230000004044 response Effects 0.000 claims description 2
- 238000004806 packaging method and process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 241000234282 Allium Species 0.000 description 1
- 235000002732 Allium cepa var. cepa Nutrition 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/58—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/583—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/50—Information retrieval; Database structures therefor; File system structures therefor of still image data
- G06F16/53—Querying
- G06F16/538—Presentation of query results
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/06009—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
- G06K19/06037—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Definitions
- the present disclosure relates to apparatus and methods for retrieving lost property or for identifying and contacting the owners of lost pets.
- the present disclosure relates to apparatus and methods for retrieving lost property or pets which have increased data security.
- ID tags such as for pets and lost property
- the tags display human readable text of the owner's contact information. This may not always be appropriate.
- the lost device could be a laptop on which is stored sensitive information. Providing the identification of the owner could increase the risk of cybercrime. It is more secure to keep the contact details anonymous.
- QR codes are also well known. QR codes are mainly used in commercial marketing activities; when the QR code is scanned, the scanner is directed to the website of the associated company or to a retail site where the associated product can be purchased. Bar codes are mainly used in purchasing transactions. Although such codes are not human readable, code scanners are widely available and it would not be difficult for a person to scan the code, convert it and access the readable text.
- RF radio frequency
- NFC Near Field Communication
- the document describes a subscription process in which the user provides various information including contact information, user shipping and billing information, and the items tagged. After a new user has subscribed, the user is sent the tags for attaching to the associated items. Therefore, there is a central database of user information which includes the name, address and financial data for each user. Apart from this database potentially being vulnerable to hacking, the acquiring and use of personal data has become a topic of concern for many people. Also, under the European General Data Protection Regulations (GDPR), there are the principles of “privacy by design” and “data minimization”. Another issue is that some users may be reluctant to apply labels to certain devices such as mobile phones.
- GDPR European General Data Protection Regulations
- a method of facilitating retrieval of lost items comprising:
- each owner a software component which is adapted to generate, at the device utilised by the owner, the image of a computer readable code, wherein the code corresponds to the identifier and a network address;
- the owner may wish to designate another person to access the network and/or arrange the retrieval of a lost item.
- the designated person may be an IT administrator.
- the method may include allowing the owner to designate another person to access the network or to designate another person as a new owner.
- owner is intended to also cover designated persons.
- the method may include allowing the owner to replace the generated code with a new code.
- the network address comprises the address of the user interface.
- the step of generating the image of the computer readable code comprises generating a QR code.
- the code generated may be a bar code or the like.
- the method may utilise Near Field Communication or radio frequency communication for storing and transmitting the computer readable code.
- the method includes using tokenization for owners accessing the computer network.
- the method includes assigning to each owner a token when the user accesses the computer network.
- each token assigned to an owner is unique.
- the method includes storing the user specific data item in a datastore or database.
- the method includes storing no contact details for each user.
- the database is a central datastore or database.
- the database is a distributed datastore or database.
- the user specific data item comprises a contact detail.
- the user specific data item comprises a single contact detail.
- the contact detail is an email address.
- the contact detail is a telephone number.
- the telephone number may be a text capable telephone number.
- the method includes storing the identifier and the user specific data item of each user separately in the datastore or database.
- the method includes storing the identifier in a first database and storing the user specific data item in a second datastore or database.
- the method includes encrypting the identifier of each user prior to storing in the datastore or database.
- the method includes encrypting the user specific data item of each user prior to storing in the datastore or database.
- the item is a computer device belonging to the owner.
- the computer device is one of a laptop, a mobile phone, and a tablet device.
- the method includes adapting the software component to present to the user information on how to put the generated image of the code on the lock screen or as a desktop image of the owner's computer device.
- the method includes generating a printer friendly version of the image of the code.
- the method includes attaching a printed version of the image of the code to the item.
- the method includes, in response to scanning of the image of the code by the finder, directing the finder to the user interface.
- the method includes facilitating further communication between the owner and the finder via the network.
- the method includes providing a messaging system on the network for owners and finders.
- the method includes encrypting one or more messages to the finder prior to sending the messages over the network.
- the method includes encrypting one or more messages to the owner prior to sending the messages over the network.
- the method includes creating an asymmetric cryptographic key pair.
- the method includes creating the asymmetric cryptographic key pair at the owner's device.
- the method includes transmitting only the public key of the key pair to the network.
- the method includes using the owner's public key as the user specific data item.
- the method includes creating and assigning a token which is specific to a particular owner's public key.
- the method includes using the same token for a particular owner each time the owner accesses the network.
- the method includes encrypting the token using the received owner's public key and sending the encrypted token to the owner.
- the method includes, at a server of the network, creating a second asymmetric cryptographic key pair.
- the method includes sending the public key of the second asymmetric cryptographic key pair to the owner.
- the method includes, at the owner's device, decrypting the encrypted token using the owner's private key.
- the method includes, at the owner's device, re-encrypting the token using the public key of the second asymmetric cryptographic key pair and sending the re-encrypted token to the network.
- the method includes, at the server of the network, decrypting the re-encrypted token using the private key of the second asymmetric cryptographic key pair and verifying that the decrypted token matches the token issued to the owner.
- the method includes encrypting one or more communications to the owner using the public key of the key pair.
- the method includes time stamping each message prior to sending.
- the method includes determining a signed message hash for each message.
- the method includes, for a sequence of messages, including a reference to the previous signed message hash.
- the method includes configuring the network such that it is accessible using the internet.
- the method includes allowing the owner to specify a reward for recovery of the lost item.
- the method includes confirming that a lost device has not been internally accessed prior to retrieval.
- the method includes supplying a plurality of tamper-proof foils to a third party vendor, each foil having one of a plurality of computer readable codes.
- the method includes supplying the foils to the vendor in bulk using packaging that obscures the code and in a random sequence.
- the method includes attaching a foil to the device such that the foil requires removal for internal access to the device.
- the method includes attaching a foil to the device over a screw which must be unfastened for internal access to the device.
- the method includes capturing an image of the device before and after the foil has been applied to the device and uploading the images to the network.
- a system for facilitating retrieval of lost items comprising:
- a processor adapted to assign to each owner an identifier
- storage means adapted to store a user specific data item and the identifier of the owner
- a software component which is provided to each owner and adapted to generate, at the owner's device, an image of a computer readable code, wherein the code corresponds to the identifier and a network address,
- the user interface is adapted to facilitate a communication from the finder and, using the user specific data item of the owner, send to the owner the communication from the finder.
- the code generated is a QR code.
- the code generated may be a bar code or the like.
- the system may utilise Near Field Communication or radio frequency communication for storing and transmitting the computer readable code.
- the user specific data item is a contact detail of the owner.
- the contact detail is an email address.
- the contact detail is a telephone number.
- the telephone number may be a text capable telephone number.
- the system includes a database for storing the identifier and contact detail of each user.
- the item is a computer device belonging to the owner.
- the computer device is one of a laptop, a mobile phone, and a tablet device.
- the software component is adapted to generate a printer friendly version of the image of the code.
- system is adapted to facilitate further communication between the owner and the finder via the network.
- the system includes a messaging system on the network for owners and finders.
- FIG. 1 is a diagrammatic view of a system in accordance with the present disclosure.
- FIG. 2 is a view of examples of images of a computer readable code generated by the system of FIG. 1 .
- FIG. 3 is a flow diagram of sequential messages sent using the system of FIG. 1 .
- FIG. 1 shows a system for facilitating retrieval of lost items.
- the system comprises:
- a computer network 10 which is accessible by owners of items who are registered members of the network 10 .
- Owners can access the network 10 using their computer devices 20 , such as a laptop, PC, smart phone, tablet etc.
- the network is administered using a network server 12 .
- the owner when an owner registers as a member of the network 10 , the owner does not need to provide any contact details. Rather, tokenisation is used.
- An asymmetric cryptographic key pair is created at the owner's device 20 .
- the owner's public key is used as a user specific data item.
- a token is created and assigned to the owner's public key. This same token may be used each time the owner accesses the network.
- the token is encrypted using the received owner's public key and the encrypted token is sent to the owner.
- a second asymmetric cryptographic key pair is created.
- the public key of the second asymmetric cryptographic key pair is also sent to the owner.
- the encrypted token is decrypted using the owner's private key.
- the token is then re-encrypted using the public key of the second asymmetric cryptographic key pair and then sent to the server 12 .
- the re-encrypted token is decrypted using the private key of the second asymmetric cryptographic key pair.
- the server 12 verifies that the decrypted token matches the token issued to the owner. If so, the owner has been validated.
- IP address of the owner's device can be disguised by using an anonymous proxy server or onion routers like the servers of the Tor Project.
- this contact detail is an email address, although it may be a telephone number. It may be a mobile telephone number which allows the sending and receiving of text messages. This is the only personal information which could be used to discover the identity of the owner that is provided to the network 10 at the time of registration. In particular, no contact address, financial details or even the owner's name need be provided.
- the owner also provides a generic description, such as “mobile phone” or “laptop” for each of the owner's items.
- a processor of the network 10 assigns to the owner an identifier.
- the user specific data item and the identifier of the owner are stored in a central database on the server 12 of the network 10 . However, they are stored separately from each other, in separate databases.
- a token is used to map the two pieces of information.
- the identifier and the user specific data item of each owner are encrypted prior to storing in the central database.
- a software app is provided to the owner by the server 12 .
- This app is adapted to generate locally (at the owner's device) an image 30 of a computer readable code. Examples of these images 30 are shown in FIG. 2 .
- a particularly suitable form of the image 30 is a QR code.
- QR scanner and QR scanning apps are readily available. It should be noted that the image 30 is not stored on, or even transmitted to, the network 10 .
- One or more of the owner's items may be an electronic device such as a laptop or smart phone and these devices typically have a lock screen.
- the software app can display to the owner instructions on how to put the generated image 30 of the code on to the lock screen. Therefore, no physical ID tag is required.
- the instructions can be displayed as a desktop image.
- the software app can generate a printer friendly version of the image 30 of the code.
- the user can therefore print off the image 30 and attach this to the item. This is unlike prior art systems in which the service provider sends tags or stickers to the owner. Such systems require storage of the owner's address details.
- prior art systems also require payment for the ID tags prior to sending, which then requires financial details of the owner to be received and stored. According to this embodiment of the disclosure, no initial payment from the owner is required. Rather, should the owner lose an item of property, the payment can be associated with facilitating the retrieval of the item.
- the software app After successful registration, the software app creates an asymmetric cryptographic key pair, such as RSA 2048 at the owner's device.
- the public key is transmitted to the server 12 where it is stored. All communications to the owner are encrypted using the public key.
- the private key, required for decrypting the communications, is not transmitted and is only stored locally on the owner's device 20 .
- the owner now has a (physical or non-physical) ID tag associated with one or more items of property.
- the owner can access the network 10 and report to the system that the item is lost. A corresponding flag is then associated with the item within the database.
- the network 10 includes a user interface for finders of a lost item.
- the generated code image 30 corresponds to the unique identifier of the owner and a network address. This may be a URL of the user interface. Therefore, the code, even after being decoded, does not include any personal details of the owner.
- a finder of a lost item displaying the image 30 can scan the image 30 using their own device 40 . When this is done, the finder is directed to the user interface.
- the action of the finder accessing the user interface also sends an alert to the system that an item has been found.
- the system first responds by looking up the database for the lost item. If the item has been flagged as lost then the system will directly move on to notifying the owner that the item has been found. If not (for example, many owners are likely to test the system by scanning the tags of their own items), then an intermediary communication can first be sent to the owner. This could be, for example, a message with the text “have you lost your [detail of item]? If so, please click ‘yes’” as well as ‘yes’ and ‘no’ option buttons.
- the landing page of the URL displays information to the finder to explain its purpose and to request the finder's assistance in achieving retrieval of the lost item.
- the owner is given the option of offering, and setting the value of, a reward to the finder for this assistance.
- the finder can input a communication to the user interface. This can be a contact email address or phone number. However, if the finder is reluctant to provide this, the communication could, say, suggest a meeting place and time for handing back the item.
- the communication from the finder is encrypted before sending to the network server 12 .
- the communication from the finder is relayed to the owner (using the only contact detail stored for the owner). Therefore, the system is acting as a middle man and both the owner and finder can retain a high degree of anonymity.
- Each message is time stamped and encrypted before sending.
- Each sequential message references the previous signed message hash. This is shown in FIG. 3 . This verifies that a particular message in the sequence has not been intercepted and tampered with by a third party.
- the owner would like to be certain that a lost device has not been internally accessed prior to retrieval. This can be done in the following manner.
- Tamper-proof foils can be supplied to a third party vendor. Each foil has one of a large number of different computer readable codes. The foils are supplied to the vendor in bulk with packaging that obscures the code and in a random sequence. Therefore, even the vendor does not know which codes are being bought by which customers.
- the owner purchases a foil for each device to be protected.
- the foil is attached to the device in such a way that it needs to be removed for someone to internally access the device.
- the foil can be attached to the device over a screw which needs to be unfastened for someone to internally access the device.
- the owner can capture an image of the device before and after the foil has been applied to the device. These images can be uploaded to the network.
- the server stores the images.
- the server also calculates secure fingerprint of that image.
- the owner can verify that the foil is undamaged and that the code on the foil is identical to the uploaded image.
- the server can validate and testify that the fingerprints before and after are identical.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Tourism & Hospitality (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Development Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Library & Information Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
A method of facilitating retrieval of lost items, the method including: providing a computer network for a plurality of owners of items which is accessible by each owner using a computer device; providing a user interface of the network for finders of a lost item; receiving from each owner a user specific data item; assigning to each owner an identifier; providing to each owner a software component which is adapted to generate, at the device utilised by the owner, the image of a computer readable code, the code corresponding to the identifier and a network address; facilitating via the user interface a communication from the finder; and using the user specific data item of the owner, sending to the owner the communication of the finder.
Description
- This application claims the benefit of U.S. Provisional Patent Application No. 62/691,691, filed on Jun. 29, 2018, the entire contents of all of which are incorporated by reference herein.
- The present disclosure relates to apparatus and methods for retrieving lost property or for identifying and contacting the owners of lost pets. In particular, but not exclusively, the present disclosure relates to apparatus and methods for retrieving lost property or pets which have increased data security.
- ID tags, such as for pets and lost property, are well known. Typically, the tags display human readable text of the owner's contact information. This may not always be appropriate. For example, the lost device could be a laptop on which is stored sensitive information. Providing the identification of the owner could increase the risk of cybercrime. It is more secure to keep the contact details anonymous.
- QR codes, bar codes and the like are also well known. QR codes are mainly used in commercial marketing activities; when the QR code is scanned, the scanner is directed to the website of the associated company or to a retail site where the associated product can be purchased. Bar codes are mainly used in purchasing transactions. Although such codes are not human readable, code scanners are widely available and it would not be difficult for a person to scan the code, convert it and access the readable text.
- It is also known to use radio frequency (RF) tags or Near Field Communication (NFC) tags for tracking items.
- In U.S. Pat. No. 9,569,950, a phone number and unique code are displayed on a tag attached to the item of property. A finder of the item can make a phone call and leaves a recorded message which is transmitted to the owner. This is said to maintain privacy for the user. However, the finder is expected to leave contact details in the message transmitted to the owner, and some people may be reluctant to do this. Also, there is no automation and support of the exchange process.
- Furthermore, the document describes a subscription process in which the user provides various information including contact information, user shipping and billing information, and the items tagged. After a new user has subscribed, the user is sent the tags for attaching to the associated items. Therefore, there is a central database of user information which includes the name, address and financial data for each user. Apart from this database potentially being vulnerable to hacking, the acquiring and use of personal data has become a topic of concern for many people. Also, under the European General Data Protection Regulations (GDPR), there are the principles of “privacy by design” and “data minimization”. Another issue is that some users may be reluctant to apply labels to certain devices such as mobile phones.
- It is desirable to provide systems for facilitating the retrieval of lost property in which the finder does not necessarily have to provide contact information to the system. It is desirable to provide systems for facilitating the retrieval of lost property in which the owner only need provide a minimum of personal information to the system.
- According to a first aspect of the present disclosure there is provided a method of facilitating retrieval of lost items, the method comprising:
- providing a computer network for a plurality of owners of items which is accessible by each owner using a computer device;
- providing a user interface of the network for finders of a lost item;
- receiving from each owner a user specific data item;
- assigning to each owner an identifier;
- providing to each owner a software component which is adapted to generate, at the device utilised by the owner, the image of a computer readable code, wherein the code corresponds to the identifier and a network address;
- facilitating via the user interface a communication from the finder;
- and using the user specific data item of the owner, sending to the owner the communication of the finder.
- The owner may wish to designate another person to access the network and/or arrange the retrieval of a lost item. For example, in a corporate organisation, the designated person may be an IT administrator. The method may include allowing the owner to designate another person to access the network or to designate another person as a new owner. Throughout this specification, the term ‘owner’ is intended to also cover designated persons.
- The method may include allowing the owner to replace the generated code with a new code.
- Optionally, the network address comprises the address of the user interface.
- Optionally, the step of generating the image of the computer readable code comprises generating a QR code. Alternatively, the code generated may be a bar code or the like.
- The method may utilise Near Field Communication or radio frequency communication for storing and transmitting the computer readable code.
- Optionally, the method includes using tokenization for owners accessing the computer network. Optionally, the method includes assigning to each owner a token when the user accesses the computer network. Optionally, each token assigned to an owner is unique.
- Optionally, the method includes storing the user specific data item in a datastore or database. Optionally, the method includes storing no contact details for each user.
- Optionally, the database is a central datastore or database. Alternatively, the database is a distributed datastore or database.
- Alternatively, the user specific data item comprises a contact detail. Optionally, the user specific data item comprises a single contact detail. Optionally, the contact detail is an email address. Alternatively, the contact detail is a telephone number. The telephone number may be a text capable telephone number.
- Optionally, the method includes storing the identifier and the user specific data item of each user separately in the datastore or database. Optionally, the method includes storing the identifier in a first database and storing the user specific data item in a second datastore or database.
- Optionally, the method includes encrypting the identifier of each user prior to storing in the datastore or database.
- Optionally, the method includes encrypting the user specific data item of each user prior to storing in the datastore or database.
- Optionally, the item is a computer device belonging to the owner. Optionally, the computer device is one of a laptop, a mobile phone, and a tablet device.
- Optionally, the method includes adapting the software component to present to the user information on how to put the generated image of the code on the lock screen or as a desktop image of the owner's computer device.
- Optionally, the method includes generating a printer friendly version of the image of the code.
- Optionally, the method includes attaching a printed version of the image of the code to the item.
- Optionally, the method includes, in response to scanning of the image of the code by the finder, directing the finder to the user interface.
- Optionally, the method includes facilitating further communication between the owner and the finder via the network.
- Optionally, the method includes providing a messaging system on the network for owners and finders.
- Optionally, the method includes encrypting one or more messages to the finder prior to sending the messages over the network.
- Optionally, the method includes encrypting one or more messages to the owner prior to sending the messages over the network.
- Optionally, the method includes creating an asymmetric cryptographic key pair.
- Optionally, the method includes creating the asymmetric cryptographic key pair at the owner's device. Optionally, the method includes transmitting only the public key of the key pair to the network.
- Optionally, the method includes using the owner's public key as the user specific data item.
- Optionally, the method includes creating and assigning a token which is specific to a particular owner's public key.
- Optionally, the method includes using the same token for a particular owner each time the owner accesses the network.
- Optionally, the method includes encrypting the token using the received owner's public key and sending the encrypted token to the owner.
- Optionally, the method includes, at a server of the network, creating a second asymmetric cryptographic key pair.
- Optionally, the method includes sending the public key of the second asymmetric cryptographic key pair to the owner.
- Optionally, the method includes, at the owner's device, decrypting the encrypted token using the owner's private key.
- Optionally, the method includes, at the owner's device, re-encrypting the token using the public key of the second asymmetric cryptographic key pair and sending the re-encrypted token to the network.
- Optionally, the method includes, at the server of the network, decrypting the re-encrypted token using the private key of the second asymmetric cryptographic key pair and verifying that the decrypted token matches the token issued to the owner.
- Optionally, the method includes encrypting one or more communications to the owner using the public key of the key pair.
- Optionally, the method includes time stamping each message prior to sending.
- Optionally, the method includes determining a signed message hash for each message. Optionally, the method includes, for a sequence of messages, including a reference to the previous signed message hash.
- Optionally, the method includes configuring the network such that it is accessible using the internet.
- Optionally, the method includes allowing the owner to specify a reward for recovery of the lost item.
- Optionally, the method includes confirming that a lost device has not been internally accessed prior to retrieval.
- Optionally, the method includes supplying a plurality of tamper-proof foils to a third party vendor, each foil having one of a plurality of computer readable codes. Optionally, the method includes supplying the foils to the vendor in bulk using packaging that obscures the code and in a random sequence.
- Optionally, the method includes attaching a foil to the device such that the foil requires removal for internal access to the device. Optionally, the method includes attaching a foil to the device over a screw which must be unfastened for internal access to the device.
- Optionally, the method includes capturing an image of the device before and after the foil has been applied to the device and uploading the images to the network.
- According to a second aspect of the present disclosure there is provided a system for facilitating retrieval of lost items, the system comprising:
- a computer network accessible by a plurality of owners of items using a computer device;
- a user interface of the network for finders of a lost item;
- a processor adapted to assign to each owner an identifier;
- storage means adapted to store a user specific data item and the identifier of the owner;
- a software component which is provided to each owner and adapted to generate, at the owner's device, an image of a computer readable code, wherein the code corresponds to the identifier and a network address,
- wherein the user interface is adapted to facilitate a communication from the finder and, using the user specific data item of the owner, send to the owner the communication from the finder.
- Optionally, the code generated is a QR code. Alternatively, the code generated may be a bar code or the like.
- The system may utilise Near Field Communication or radio frequency communication for storing and transmitting the computer readable code.
- Optionally, the user specific data item is a contact detail of the owner. Optionally, the contact detail is an email address. Optionally, the contact detail is a telephone number. The telephone number may be a text capable telephone number.
- Optionally, the system includes a database for storing the identifier and contact detail of each user.
- Optionally, the item is a computer device belonging to the owner. Optionally, the computer device is one of a laptop, a mobile phone, and a tablet device.
- Optionally, the software component is adapted to generate a printer friendly version of the image of the code.
- Optionally, the system is adapted to facilitate further communication between the owner and the finder via the network.
- Optionally, the system includes a messaging system on the network for owners and finders.
- The disclosure will be described below, by way of example only, with reference to the accompanying drawings, in which:
-
FIG. 1 is a diagrammatic view of a system in accordance with the present disclosure. -
FIG. 2 is a view of examples of images of a computer readable code generated by the system ofFIG. 1 . -
FIG. 3 is a flow diagram of sequential messages sent using the system ofFIG. 1 . -
FIG. 1 shows a system for facilitating retrieval of lost items. The system comprises: - a
computer network 10 which is accessible by owners of items who are registered members of thenetwork 10. Owners can access thenetwork 10 using theircomputer devices 20, such as a laptop, PC, smart phone, tablet etc. The network is administered using anetwork server 12. - According to a first embodiment of the disclosure, when an owner registers as a member of the
network 10, the owner does not need to provide any contact details. Rather, tokenisation is used. - An asymmetric cryptographic key pair is created at the owner's
device 20. The owner's public key is used as a user specific data item. A token is created and assigned to the owner's public key. This same token may be used each time the owner accesses the network. The token is encrypted using the received owner's public key and the encrypted token is sent to the owner. - Also, at the
server 12, a second asymmetric cryptographic key pair is created. The public key of the second asymmetric cryptographic key pair is also sent to the owner. - At the owner's
device 20, the encrypted token is decrypted using the owner's private key. The token is then re-encrypted using the public key of the second asymmetric cryptographic key pair and then sent to theserver 12. - At the
server 12, the re-encrypted token is decrypted using the private key of the second asymmetric cryptographic key pair. Theserver 12 then verifies that the decrypted token matches the token issued to the owner. If so, the owner has been validated. - In future sessions when the owner accesses the
network 10, the same token may be used but a new asymmetric cryptographic key pair may be created. Indeed, this could be done for each session so that the encryption is effectively a one time pad. - For further security, the IP address of the owner's device can be disguised by using an anonymous proxy server or onion routers like the servers of the Tor Project.
- According to a second embodiment of the disclosure, when an owner registers as a member of the
network 10, the owner must provide a single contact detail. Typically, this contact detail is an email address, although it may be a telephone number. It may be a mobile telephone number which allows the sending and receiving of text messages. This is the only personal information which could be used to discover the identity of the owner that is provided to thenetwork 10 at the time of registration. In particular, no contact address, financial details or even the owner's name need be provided. The owner also provides a generic description, such as “mobile phone” or “laptop” for each of the owner's items. - A processor of the
network 10 assigns to the owner an identifier. The user specific data item and the identifier of the owner are stored in a central database on theserver 12 of thenetwork 10. However, they are stored separately from each other, in separate databases. A token is used to map the two pieces of information. Furthermore, the identifier and the user specific data item of each owner are encrypted prior to storing in the central database. - Following successful registration, a software app is provided to the owner by the
server 12. This app is adapted to generate locally (at the owner's device) animage 30 of a computer readable code. Examples of theseimages 30 are shown inFIG. 2 . A particularly suitable form of theimage 30 is a QR code. A number of operating systems now include a QR scanner and QR scanning apps are readily available. It should be noted that theimage 30 is not stored on, or even transmitted to, thenetwork 10. - One or more of the owner's items may be an electronic device such as a laptop or smart phone and these devices typically have a lock screen. The software app can display to the owner instructions on how to put the generated
image 30 of the code on to the lock screen. Therefore, no physical ID tag is required. Alternatively, the instructions can be displayed as a desktop image. - For non-electronic items, the software app can generate a printer friendly version of the
image 30 of the code. The user can therefore print off theimage 30 and attach this to the item. This is unlike prior art systems in which the service provider sends tags or stickers to the owner. Such systems require storage of the owner's address details. - Typically, prior art systems also require payment for the ID tags prior to sending, which then requires financial details of the owner to be received and stored. According to this embodiment of the disclosure, no initial payment from the owner is required. Rather, should the owner lose an item of property, the payment can be associated with facilitating the retrieval of the item.
- After successful registration, the software app creates an asymmetric cryptographic key pair, such as RSA 2048 at the owner's device. The public key is transmitted to the
server 12 where it is stored. All communications to the owner are encrypted using the public key. The private key, required for decrypting the communications, is not transmitted and is only stored locally on the owner'sdevice 20. - The owner now has a (physical or non-physical) ID tag associated with one or more items of property. In the event that the owner should lose one of these items, the owner can access the
network 10 and report to the system that the item is lost. A corresponding flag is then associated with the item within the database. - The
network 10 includes a user interface for finders of a lost item. The generatedcode image 30 corresponds to the unique identifier of the owner and a network address. This may be a URL of the user interface. Therefore, the code, even after being decoded, does not include any personal details of the owner. A finder of a lost item displaying theimage 30 can scan theimage 30 using theirown device 40. When this is done, the finder is directed to the user interface. - The action of the finder accessing the user interface also sends an alert to the system that an item has been found. The system first responds by looking up the database for the lost item. If the item has been flagged as lost then the system will directly move on to notifying the owner that the item has been found. If not (for example, many owners are likely to test the system by scanning the tags of their own items), then an intermediary communication can first be sent to the owner. This could be, for example, a message with the text “have you lost your [detail of item]? If so, please click ‘yes’” as well as ‘yes’ and ‘no’ option buttons.
- The landing page of the URL displays information to the finder to explain its purpose and to request the finder's assistance in achieving retrieval of the lost item. During registration, the owner is given the option of offering, and setting the value of, a reward to the finder for this assistance.
- If the finder is willing to help with retrieval of the lost item, the finder can input a communication to the user interface. This can be a contact email address or phone number. However, if the finder is reluctant to provide this, the communication could, say, suggest a meeting place and time for handing back the item. The communication from the finder is encrypted before sending to the
network server 12. - If the item has been verified as lost by the owner, the communication from the finder is relayed to the owner (using the only contact detail stored for the owner). Therefore, the system is acting as a middle man and both the owner and finder can retain a high degree of anonymity.
- Further messages between the owner and finder may be required to negotiate how the item is to be returned. This can be done via the
network 10, again avoiding the need for any direct contact between the owner and finder. - Each message is time stamped and encrypted before sending. Each sequential message references the previous signed message hash. This is shown in
FIG. 3 . This verifies that a particular message in the sequence has not been intercepted and tampered with by a third party. - Especially for devices that hold sensitive information, the owner would like to be certain that a lost device has not been internally accessed prior to retrieval. This can be done in the following manner.
- Tamper-proof foils can be supplied to a third party vendor. Each foil has one of a large number of different computer readable codes. The foils are supplied to the vendor in bulk with packaging that obscures the code and in a random sequence. Therefore, even the vendor does not know which codes are being bought by which customers.
- The owner purchases a foil for each device to be protected. The foil is attached to the device in such a way that it needs to be removed for someone to internally access the device. For example, the foil can be attached to the device over a screw which needs to be unfastened for someone to internally access the device. The owner can capture an image of the device before and after the foil has been applied to the device. These images can be uploaded to the network. The server stores the images. The server also calculates secure fingerprint of that image. When the device is retrieved, the owner can verify that the foil is undamaged and that the code on the foil is identical to the uploaded image. The server can validate and testify that the fingerprints before and after are identical.
- Various modifications and improvements can be made to the above without departing from the scope of the disclosure.
Claims (21)
1. A method of facilitating retrieval of lost items, the method comprising:
providing a computer network for a plurality of owners of items which is accessible by each owner using a computer device;
providing a user interface of the network for finders of a lost item;
receiving from each owner a user specific data item;
assigning to each owner an identifier;
providing to each owner a software component which is adapted to generate, at the device utilised by the owner, an image of a computer readable code, wherein the code corresponds to the identifier and a network address;
facilitating via the user interface a communication from the finder; and
using the user specific data item of the owner, sending to the owner the communication of the finder.
2. A method as claimed in claim 1 , wherein the step of generating the image of the computer readable code further comprises generating a QR code.
3. A method as claimed in claim 1 , wherein the user specific data item comprises a contact detail.
4. A method as claimed in claim 1 , wherein the method includes assigning to each user a token when accessing the computer network.
5. A method as claimed in claim 1 , wherein the method includes storing the identifier and the user specific data item of each user separately in a central database.
6. A method as claimed in claim 5 , wherein the method includes encrypting the identifier and the user specific data item of each user prior to storing in the central database.
7. A method as claimed in claim 1 , wherein the item is a computer device belonging to the owner, and wherein the method includes adapting the software component to present to the user information on how to put the generated image of the code on a lock screen or as a desktop image of the owner's computer device.
8. A method as claimed in claim 1 , wherein the method includes, in response to scanning of the image of the code by the finder, directing the finder to the user interface.
9. A method as claimed in claim 1 , wherein the method includes facilitating further communication between the owner and the finder via the network.
10. A method as claimed in claim 1 , wherein the method includes creating an asymmetric cryptographic key pair at the owner's device, and wherein the method includes transmitting only a public key of the key pair to the network.
11. A method as claimed in claim 10 , wherein the method includes using the owner's public key as the user specific data item.
12. A method as claimed in claim 10 , wherein the method includes creating and assigning a token which is specific to a particular owner's public key, and wherein the method includes encrypting the token using the received owner's public key and sending the encrypted token to the owner.
13. A method as claimed in claim 10 , wherein the method includes, at a server of the network, creating a second asymmetric cryptographic key pair, and wherein the method includes sending a public key of the second asymmetric cryptographic key pair to the owner.
14. A method as claimed in claim 13 , wherein the method includes, at the owner's device, decrypting the encrypted token using the owner's private key.
15. A method as claimed in claim 14 , wherein the method includes, at the owner's device, re-encrypting the token using the public key of the second asymmetric cryptographic key pair and sending the re-encrypted token to the network.
16. A method as claimed in claim 15 , wherein the method includes, at the server of the network, decrypting the re-encrypted token using the private key of the second asymmetric cryptographic key pair and verifying that the decrypted token matches the token issued to the owner.
17. A method as claimed in claim 10 , wherein the method includes encrypting one or more communications to the owner using the public key of the key pair.
18. A method as claimed in claim 1 , wherein the method includes confirming that a lost device has not been internally accessed prior to retrieval.
19. A method as claimed in claim 18 , wherein the method includes supplying a plurality of tamper-proof foils to a third party vendor, each foil having one of a plurality of computer readable codes.
20. A method as claimed in claim 19 , wherein the method includes attaching a foil to the device such that the foil requires removal for internal access to the device.
21. A method as claimed in claim 20 , wherein the method includes capturing an image of the device before and after the foil has been applied to the device and uploading the images to the network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/451,182 US20200004775A1 (en) | 2018-06-29 | 2019-06-25 | Apparatus and methods for retrieving lost property |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862691691P | 2018-06-29 | 2018-06-29 | |
US16/451,182 US20200004775A1 (en) | 2018-06-29 | 2019-06-25 | Apparatus and methods for retrieving lost property |
Publications (1)
Publication Number | Publication Date |
---|---|
US20200004775A1 true US20200004775A1 (en) | 2020-01-02 |
Family
ID=66554163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/451,182 Abandoned US20200004775A1 (en) | 2018-06-29 | 2019-06-25 | Apparatus and methods for retrieving lost property |
Country Status (3)
Country | Link |
---|---|
US (1) | US20200004775A1 (en) |
EP (1) | EP3588397A1 (en) |
GB (1) | GB2575166A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200329041A1 (en) * | 2015-12-03 | 2020-10-15 | Amazon Technologies, Inc. | Cross-region requests |
US20200342459A1 (en) * | 2019-04-25 | 2020-10-29 | Shazzle, Llc | Trusted customer identity systems and methods |
DE102020126703A1 (en) | 2020-10-12 | 2022-04-14 | Stefan Ernst Uhl | Method for computer-assisted terminal search |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2021221664A1 (en) * | 2020-09-05 | 2022-03-24 | Trakwise Pty Ltd | Systems, methods and devices configured to enable long-range discovery and management of portable item trackers |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030021417A1 (en) * | 2000-10-20 | 2003-01-30 | Ognjen Vasic | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data |
US7956744B2 (en) * | 2008-04-30 | 2011-06-07 | Trackitback | Digital ID tag for lost or stolen electronics devices |
US8973813B2 (en) * | 2011-04-19 | 2015-03-10 | Nadine Wendy Penny | System for facilitating return of lost property |
US8890692B1 (en) * | 2011-11-04 | 2014-11-18 | Automated Assembly Corporation | Systems and methods for aiding in recovery of lost articles |
WO2013188374A2 (en) * | 2012-06-13 | 2013-12-19 | Tag-A-Bag Holdings, L.L.C. | Universal lost & found or locating system and device |
WO2016072942A1 (en) * | 2014-11-05 | 2016-05-12 | Meric Turan Ozgur | The lost item system in which owner of the item reaches the one finding the item |
US20160378877A1 (en) * | 2015-05-13 | 2016-12-29 | Vishal Khemka | System and method for recovering lost items |
US9853965B2 (en) * | 2015-08-24 | 2017-12-26 | Verizon Patent And Licensing Inc. | Authentication service for third party applications |
US9569950B1 (en) | 2015-12-29 | 2017-02-14 | Eidtag, Llc | Lost and found system for personal items |
WO2018209187A1 (en) * | 2017-05-12 | 2018-11-15 | Elkowitz Marc | Lost and found systems, methods, and devices |
-
2019
- 2019-05-13 EP EP19174231.1A patent/EP3588397A1/en not_active Withdrawn
- 2019-05-13 GB GB201906736A patent/GB2575166A/en not_active Withdrawn
- 2019-06-25 US US16/451,182 patent/US20200004775A1/en not_active Abandoned
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200329041A1 (en) * | 2015-12-03 | 2020-10-15 | Amazon Technologies, Inc. | Cross-region requests |
US11671425B2 (en) * | 2015-12-03 | 2023-06-06 | Amazon Technologies, Inc. | Cross-region requests |
US20200342459A1 (en) * | 2019-04-25 | 2020-10-29 | Shazzle, Llc | Trusted customer identity systems and methods |
DE102020126703A1 (en) | 2020-10-12 | 2022-04-14 | Stefan Ernst Uhl | Method for computer-assisted terminal search |
Also Published As
Publication number | Publication date |
---|---|
EP3588397A1 (en) | 2020-01-01 |
GB2575166A (en) | 2020-01-01 |
GB201906736D0 (en) | 2019-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200004775A1 (en) | Apparatus and methods for retrieving lost property | |
US11107088B2 (en) | Open registry for internet of things | |
US11354676B2 (en) | Open registry for identity of things | |
CN103282925B (en) | The system and method for privacy of user is protected in the multimedia upload to internet website | |
AU2011313826B2 (en) | System and method of conducting transactions | |
US10152582B2 (en) | System and method for securing, and providing secured access to encrypted global identities embedded in a QR code | |
CN108960863A (en) | A kind of food block chain retroactive method, device and electronic equipment | |
US20160027021A1 (en) | Product Authenticator | |
US20050278544A1 (en) | Removable data storage medium and associated marketing interface | |
WO2015027781A1 (en) | Communication method, data processing platform and communication system | |
US20070174196A1 (en) | System and method for verifying authenticity | |
US11861042B2 (en) | Individual data unit and methods and systems for enhancing the security of user data | |
US11601551B2 (en) | Methods and systems for providing rich interactive communication services on an electronic device | |
US20120197688A1 (en) | Systems and Methods for Verifying Ownership of Printed Matter | |
CN114862393B (en) | Secure transaction pairing method and system under delivery service platform | |
WO2015039025A1 (en) | Methods and systems for using scanable codes to obtain scan-triggered services | |
US11177959B2 (en) | Cryptography method and system for securing data via electronic transmission | |
TW201828171A (en) | Method for acquiring user information and relevant device | |
JP2007265090A (en) | Information processor and information processing system | |
CN110532792B (en) | Method and system for checking privacy information | |
US20170249685A1 (en) | System and method for communicating with retail customers with a sustainability standard | |
US20130212201A1 (en) | On-demand marketing literature distribution system | |
Omotosho et al. | Securing e-prescription from medical identity theft using steganography and antiphishing techniques | |
CN114139195A (en) | Private data protection method and device, intelligent terminal and storage medium | |
KR20180014746A (en) | Interactive record lookup processing method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SOCIAL CRM SQUAD LTD., GREAT BRITAIN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BEUTELSCHIESS, FRANK;REEL/FRAME:049575/0514 Effective date: 20190614 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |